fff
ggg
Static task
static1
Behavioral task
behavioral1
Sample
7e905af62539ceb82d0c35a7e1c7ddf8.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e905af62539ceb82d0c35a7e1c7ddf8.dll
Resource
win10v2004-20231222-en
Target
7e905af62539ceb82d0c35a7e1c7ddf8
Size
40KB
MD5
7e905af62539ceb82d0c35a7e1c7ddf8
SHA1
b33e637a7a0bf3ad3949a8b9ef3fe88209d3f33c
SHA256
997b1ba6e77f1afc8ff4d9faaefecf8cc778707f27a7ce44b068b64606617fcd
SHA512
5769cf074bed5bde63149b011ccb4f7833e3ddd111afe5e0091ad8b3d802257f3c84ea547bfcf2b27c304a4a03ece11b1d93717f5aab080dfdbb55a01543b542
SSDEEP
768:O5Br1IV0gDMS+1t/j1OJsBkd8N8l8ZAUSYNF:O5V40CRBqfo/oF
Checks for missing Authenticode signature.
resource |
---|
7e905af62539ceb82d0c35a7e1c7ddf8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
DeleteFileA
GetTempPathA
VirtualAlloc
LoadLibraryA
WriteFile
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
ExitProcess
GetLastError
GetCurrentThreadId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
GetSystemDirectoryA
CreateThread
CallNextHookEx
UnhookWindowsHookEx
GetWindowThreadProcessId
GetWindowTextA
GetForegroundWindow
SetWindowsHookExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
DeleteUrlCacheEntry
InternetReadFile
InternetCloseHandle
PathFileExistsA
URLDownloadToFileA
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
fopen
fread
fclose
strcat
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcpy
strlen
atoi
strstr
??3@YAXPAX@Z
strncpy
strchr
fff
ggg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ